Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
Abstract The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging net¬works. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of a fully trusted key gen¬eration center, and the dynamics of the sender. The existing key management paradigms cannot deal with these challenges effec-tively. In this paper, we circumvent these obstacles and close this gap by proposing a novel key management paradigm. The new par¬adigm is a hybrid of traditional broadcast encryption and group key agreement. In such a system, each member maintains a single public/secret key pair. Upon seeing the public keys of the members, aremotesendercan securely broadcast to any intended subgroup chosen in an ad hoc way.
Abstract con… Following this model, we instantiate a scheme that is proven secure in the standard model. Even if all the nonintended members collude, they cannot extract any useful in¬formation from the transmitted messages. After the public group encryption key is extracted, both the computation overhead and the communication cost are independent of the group size. Fur¬thermore, our scheme facilitates simple yet efficient member dele¬tion/addition and flexible rekeying strategies. Its strong security against collusion, its constant overhead, and its implementation friendliness without relying on a fully trusted authority render our protocol a very promising solution to many applications.
Existing system IN MANY newly emerging networks, there is a need to broadcast to remote cooperative groups using encrypted transmission. Examples can be found in access control in remote group communication arising in wireless mesh net¬works (WMNs), mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), etc.
Architecture Diagram
System specification HARDWARE REQUIREMENTS Processor : intel Pentium IV Ram : 512 MB Hard Disk : 80 GB HDD SOFTWARE REQUIREMENTS Operating System : windows XP / Windows 7 FrontEnd : Java BackEnd : MySQL 5
CONCLUSION We proposed adaptive techniques to suggest relevant at¬tributes to annotate a document, while trying to satisfy the user querying needs. Our solution is based on a probabilistic framework that considers the evidence in the document content and the query workload. We present two ways to combine these two pieces of evidence, content value and querying value: a model that considers both components conditionally independent and a linear weighted model. Ex¬periments shows that using our techniques, we can suggest attributes that improve the visibility of the documents with respect to the query workload by up to 50%. That is, we show that using the query workload can greatly improve the annotation process and increase the utility of shared data.
THANK YOU